Your SlideShare is downloading. ×
Smart card ppt
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Smart card ppt


Published on

Published in: Technology, Business

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1.
  • 2. Smart cards
  • 3. Introduction :
    A smart card, typically a type of chip card, is a plastic card that contains an embedded computer chip–either a memory or microprocessor type–that stored and transacts data. This data is usually associated with either value, information, or both and is stored
    Ex :healthcare,banking,entertainment, and transportation
    History :
    1982, while working for German company Giesecke &Devrient. The first mass use of the cards was as a Telecarte for payment in French pay phones, starting
    The second use integrated microchips into all French carte Bleue debitcards in 1992.
  • 4. Contact Smart Cards :
    Contact smart cards have a contact area of approximately 1 
    square centimeter (0.16 sq in), comprising several gold-plated contact pads.
    These pads provide electrical connectivity when inserted into a reader.
  • 5. How to use signals :
    VCC  - power supply
    RST  - Reset signal, used to reset the card's communications.
    CLK   -Provides the card with a clock signal, from which data communications timing is
    GND - Ground (reference voltage).
    VPP  - Programming voltage input - originally an input for a higher voltage to program
    persistent memory (e.g., EEPROM), but now deprecated.
    I/O - Serial input and output (half duplex).
    C4, C8 - The two remaining contacts are AUX1 and AUX2 respectively, and used
    for USB interfaces and other uses.
  • 6. Reader
    Contact smart cards readers are used as a communication medium between the smart card and a host or a mobile telephone this are used subscriber identity modules( Sims )in mobile phone
  • 7. Applications :
    • First introduced in Europe smart cards debuted as a stored value tool for
    payphones to reduce theft.
    • smart cards and other chip-based cards advanced, people found
    new ways to use charge cards for credit
    • purchases and for record keeping in place of paper.
    • 8. In the U.S., consumers have been using chip cards for everything from visiting
    libraries to buying groceries to attending movies
    • Many industries have implemented the power of smart cards in their products,
    such as the GSM digital cellular phones as well as TV- satellite decoders.
  • 9. Why can be use smart cards :
    • Smart cards improve the convenience and security of any transaction.
    • 10. Smart card systems have proven to be more reliable than other machine-
    readable cards, like magnetic stripe and barcode,
    • Smart cards also provide vital components of system security for the
    exchange of data throughout virtually any type of network.
    • To making smart cards a cost-effective solution in these environments.
    • 11.   Multifunction cards can also be used to manage network system access
    and store value and other data.
  • 12.
    • Securing digital contents & physical Assets
    • 13. E-Commerce.
    • 14. Bank issued smart cards.
    • 15. Health care Informatics.
    • 16. Embedded medical device control.
    • 17. Enterprise and Network security.
  • Physical access:
    Businesses and universities of all types need simple identity cards for all employees and students. Most of these individuals are also granted access to certain data, equipment, and departments according to their status.
  • 18. Security :
    • Security is basically the protection of something valuable to ensure
    that it is not stolen, lost, or altered.
    • Smart cards provide computing and business systems the enormous
    benefit of portable and secure storage of data and value.
    Security mechanism :
    • password
    • 19. Cryptographic challenge Response
    • 20. Biometric information
  • password verification :
    • Terminal asks the user to provide a password.
    • 21. Password is sent to Card for verification.
    • 22. Scheme can be used to permit user authentication.
    • 23. Not a person identification scheme
  • password verification :
    Read: Free
    Write: upon verification
    Select: P2 verification
    EF1 (personal data)
    Name: Rajat Moona
    PF/Roll: 2345
    EF1 (personal data)
    Name: Rajat Moona
    PF/Roll: 2345
    EF1 (personal data)
    Name: Rajat Moona
    PF/Roll: 2345
    Read: Free
    Write: Password Verification (P1)
    EF2 (Address)
    #320, CSE (off)
    475, IIT (Res)
    EF2 (Address)
    #320, CSE (off)
    475, IIT (Res)
    EF2 (Address)
    #320, CSE (off)
    475, IIT (Res)
    EF3 (password)
    P1 (User password)
    EF4 (keys)
    K1 (DOSA’s key)
    K2 (DOFA’s key)
    K3 (Registrar’s key)
    EF3 (password)
    P1 (User password)
    P2 (sys password)
    EF3 (password)
    P1 (User password)
    P2 (sys password)
    EF4 (keys)
    K1 (DOSA’s key)
    K2 (DOFA’s key)
    K3 (Registrar’s key)
    EF3 (password)
    P1 (User password)
    P2 (sys password)
    Read: Never
    Write: Once
    Read: Never
    Write: Password Verification (P1)
  • 24. Cryptography Verification :
    Cryptographic smart cards are often used for single sign-on. Most advanced smart cards include specialized cryptographic hardware that uses algorithms such as RSA and DSA.
    • Terminal verify card (INTERNAL AUTH)
    • 25. Terminal sends a random number to card to be hashed or encrypted using a key.
    • 26. Card provides the hash or cyphertext.
    • 27. Terminal can know that the card is authentic.
    • 28. Card needs to verify (EXTERNAL AUTH)
    • 29. Terminal asks for a challenge and sends the response to card to verify
    • 30. Card thus know that terminal is authentic.
    • 31. Primarily for the “Entity Authentication”
  • Biometric techniques:
    • Finger print identification.
    • 32. finger prints can be kept on the card (even verified on the card)
    • 33. Photograph/IRIS pattern etc.
    • 34. Such information is to be verified by a person. The information can be
    stored in the card securely
  • 35. Standards :
    International Organization for Standardization (ISO)
    • ISO/IEC 7816 It contains fourteen parts. 1, 2 and 3 deal only with contact smart card.
    4,5,6,8,9,11,13 and 15 are relevant to contact aswell as contactless.
    • ISO/IEC 14443: It defines the interfaces to a "close proximity" contactless smart
    card, including the radio frequency (RF) interface.
    Federal Information Processing Standards (FIPS)
    • FIPS 140 (1-3): The security requirements contained in FIPS 140 (1-3) certain Areas
    relatedto the Secure design and implementation of a cryptographic module
    specification; Cryptographic module ports and interfaces
    • FIPS 201this specification covers all aspects of multifunction cards used in identity
    management systems throughout the U.S. government.
  • 36. Conclusions:
    Smart cards can add convenience and safety to any transaction of value and data. Evaluations of performance, cost and security that will produce a smart card system that fits today's needs in future, which leads to better business for everybody
  • 37. Any queries?